Blogs

Learning IoT with TQL One Course

On a mundane February afternoon, as I headed for lunch, I remember getting a phone  call from within my company, and with it an opportunity to participate in an IoT  training program! Little did I know that the training sessions were supposed to be on-line, live, interactive but early in the morning. I'm not a...

Fluent API Client for Openstack – Trove

Trove Overview OpenStack Trove is a DBaaS (Database as a service) solution. It offers IT organizations the ability to operate a complete DBaaS platform within the enterprise. IT organizations can offer a rich variety of databases to their internal customers with the same ease of use that Amazon offers with its AWS cloud and the...

Evolution of Computing

Pre Computers Era This can be termed as ‘pen and paper’ era. It witnessed the building of the foundation. The concept of numbers became concrete. The zero was invented by Brahmagupta or Aryabhata depending on which way you look at it. The number systems evolved. The earliest known tool used in computation was the Abacus...

OTP Library

The authors for this blog are Abdul Waheed and Paresh Borkar. Many organizations today still struggle with providing strong authentication for their web-based applications. Most organizations continue to rely solely on passwords for user authentication, which tend to be weak (to be easy to memorize), shared across systems, etc. Though there have been strides towards...

Openstack 4j CLI

The project described in the post was started with a thought of having an easy automation tool to interact with Openstack. Considering the challenges one has with existing Openstack CLI, this tool offers a very good starting point in overcoming those challenges Setup Unlike the existing Openstack CLI, this tool does not require any pre-requisite...

Fluent API Client for Openstack – Group Based Policy

Group-Based Policy Overview With the popularity of Openstack and growing community-based initiative in more than hundred countries; there is a major community-based initiative by thousands of contributors. It's time to focus on real challenges that involve deployment and delivery of applications and services with flexibility, security, speed and scale rather than just orchestration of infrastructure...

The Power of Context-Aware Authentication

Overview There has been much discussion around various authentication methods, which range from username-password to leveraging OTPs, hardware tokens or biometrics, to client certificates etc. Each of these methods provide varying level of confidence in the overall authentication process. This makes one wonder which authentication method is best for a particular organization’s needs. The fundamental...

Imagine Audio Video Conferencing Without Disruptions – We Did!

I have always been fascinated by the way in which real-time streaming technology has evolved. Today this technology can be used to deliver multimedia content simultaneously to participants of a network-based communication. Multimedia content may include audio, video, graphics, animation, images, text, etc. To be effective, streaming multimedia is presented in a continuous fashion, and...

Stream It On!

If you ever thought that the data in your application's ecosystem had valuable insights, you were right and chances are that you are already leveraging those. But if you thought the value was only in the archived data ('data at rest'), think again. The 'moving' data has equal significance, and often, more business value and...